語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Counter-Terrorism Technologies = A C...
~
SpringerLink (Online service)
Counter-Terrorism Technologies = A Critical Assessment /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Counter-Terrorism Technologies/ by Peter Lehr.
其他題名:
A Critical Assessment /
作者:
Lehr, Peter.
面頁冊數:
VII, 217 p.online resource. :
Contained By:
Springer Nature eBook
標題:
Terrorism. -
電子資源:
https://doi.org/10.1007/978-3-319-90924-0
ISBN:
9783319909240
Counter-Terrorism Technologies = A Critical Assessment /
Lehr, Peter.
Counter-Terrorism Technologies
A Critical Assessment /[electronic resource] :by Peter Lehr. - 1st ed. 2019. - VII, 217 p.online resource. - Advanced Sciences and Technologies for Security Applications,1613-5113. - Advanced Sciences and Technologies for Security Applications,.
Introduction: Terrorism as a Threat to Open Societies -- Part 1: Barbarians at the Gates: ‘Sinful’ Cities -- Actions: The Return of Urban Guerillas -- Reactions: The New (Para-) Military Urbanism -- Consequences: The Urban Space as a (Limited) Battlespace. Part 2: ‘Our Silicon Will Win’: The Role of Technology in Urban Counter-Terrorism -- Identification: Biometrics, or a Real-Time 'Who is Who' -- Prediction and Postdiction: Real-Time Data Mining and Data Analytics -- Detection: Scanning and 'Sniffing' Technologies -- Surveillance and Observation: The All-Seeing Eye of Big Brother -- Protection: Defensible Spaces -- Threat Displacement Instead of Threat Eradication: Come Concluding Caveats -- Part 3: Brave New Cities: The Law of Unintended Consequences -- The Quest for Silver Bullets: Implications for our Construction of Citizenship -- Archipelagos of Fear: CT Technology and the Securitization of Everyday Life -- Undemocratic Means: The Rise of the Surveillance State -- Democracy Transfigured: The Dawn of the 'Umpire State' -- Outlook: The Need for 'Critical' Critical Infrastructure Studies.
This book critically discusses the role of technology for counter-terrorism in general, and for securing our vulnerable open societies in particular. It is set against the backdrop of the terrorist threat posed by the combined forces of Al Qaeda and ISIS/Daesh in the foreseeable future. The book commences by illuminating current and foreseeable tactics and weapons used by these implacable enemies – weapons that may well include chemical, biological, radiological and potentially even nuclear (CBRN) devices. In a second part, it introduces technologies already available or in development that promise an increase in safety and security when it comes to the dangers posed by these terrorists. This part also includes a critical discussion of advantages and disadvantages of such technologies that are, quite often, sold as a ‘silver bullet’ approach in the fight against terrorism. Controversies such as those triggered by the abuse of millimeter wave scanners deployed at several Western European airports will demonstrate that there are costs involved with regard to human rights. The third, analytical part takes the critical discussion further by arguing that the uncritical fielding of new surveillance and control technologies in parallel with the on-going outsourcing and privatization of key services of the state could well lead to dystopias as envisaged in a rather prescient way by the so-called cyperpunk novels of the 1980s. The book concludes with the question that any liberal democracy should ask itself: how far can we go with regard to hardening our societies against terrorist threats?
ISBN: 9783319909240
Standard No.: 10.1007/978-3-319-90924-0doiSubjects--Topical Terms:
557490
Terrorism.
LC Class. No.: JX5420
Dewey Class. No.: 303.625
Counter-Terrorism Technologies = A Critical Assessment /
LDR
:04183nam a22004095i 4500
001
1016564
003
DE-He213
005
20200702231807.0
007
cr nn 008mamaa
008
210106s2019 gw | s |||| 0|eng d
020
$a
9783319909240
$9
978-3-319-90924-0
024
7
$a
10.1007/978-3-319-90924-0
$2
doi
035
$a
978-3-319-90924-0
050
4
$a
JX5420
072
7
$a
JPWL
$2
bicssc
072
7
$a
POL037000
$2
bisacsh
072
7
$a
JPWL
$2
thema
082
0 4
$a
303.625
$2
23
100
1
$a
Lehr, Peter.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
970794
245
1 0
$a
Counter-Terrorism Technologies
$h
[electronic resource] :
$b
A Critical Assessment /
$c
by Peter Lehr.
250
$a
1st ed. 2019.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
VII, 217 p.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Advanced Sciences and Technologies for Security Applications,
$x
1613-5113
505
0
$a
Introduction: Terrorism as a Threat to Open Societies -- Part 1: Barbarians at the Gates: ‘Sinful’ Cities -- Actions: The Return of Urban Guerillas -- Reactions: The New (Para-) Military Urbanism -- Consequences: The Urban Space as a (Limited) Battlespace. Part 2: ‘Our Silicon Will Win’: The Role of Technology in Urban Counter-Terrorism -- Identification: Biometrics, or a Real-Time 'Who is Who' -- Prediction and Postdiction: Real-Time Data Mining and Data Analytics -- Detection: Scanning and 'Sniffing' Technologies -- Surveillance and Observation: The All-Seeing Eye of Big Brother -- Protection: Defensible Spaces -- Threat Displacement Instead of Threat Eradication: Come Concluding Caveats -- Part 3: Brave New Cities: The Law of Unintended Consequences -- The Quest for Silver Bullets: Implications for our Construction of Citizenship -- Archipelagos of Fear: CT Technology and the Securitization of Everyday Life -- Undemocratic Means: The Rise of the Surveillance State -- Democracy Transfigured: The Dawn of the 'Umpire State' -- Outlook: The Need for 'Critical' Critical Infrastructure Studies.
520
$a
This book critically discusses the role of technology for counter-terrorism in general, and for securing our vulnerable open societies in particular. It is set against the backdrop of the terrorist threat posed by the combined forces of Al Qaeda and ISIS/Daesh in the foreseeable future. The book commences by illuminating current and foreseeable tactics and weapons used by these implacable enemies – weapons that may well include chemical, biological, radiological and potentially even nuclear (CBRN) devices. In a second part, it introduces technologies already available or in development that promise an increase in safety and security when it comes to the dangers posed by these terrorists. This part also includes a critical discussion of advantages and disadvantages of such technologies that are, quite often, sold as a ‘silver bullet’ approach in the fight against terrorism. Controversies such as those triggered by the abuse of millimeter wave scanners deployed at several Western European airports will demonstrate that there are costs involved with regard to human rights. The third, analytical part takes the critical discussion further by arguing that the uncritical fielding of new surveillance and control technologies in parallel with the on-going outsourcing and privatization of key services of the state could well lead to dystopias as envisaged in a rather prescient way by the so-called cyperpunk novels of the 1980s. The book concludes with the question that any liberal democracy should ask itself: how far can we go with regard to hardening our societies against terrorist threats?
650
0
$a
Terrorism.
$3
557490
650
0
$a
Political violence.
$3
567618
650
0
$a
System safety.
$3
639363
650
0
$a
Risk management.
$3
559158
650
0
$a
Crime—Sociological aspects.
$3
1253677
650
1 4
$a
Terrorism and Political Violence.
$3
1105326
650
2 4
$a
Security Science and Technology.
$3
783419
650
2 4
$a
Risk Management.
$3
569483
650
2 4
$a
Crime and Society.
$3
1104968
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783319909233
776
0 8
$i
Printed edition:
$z
9783319909257
776
0 8
$i
Printed edition:
$z
9783030081324
830
0
$a
Advanced Sciences and Technologies for Security Applications,
$x
1613-5113
$3
1266773
856
4 0
$u
https://doi.org/10.1007/978-3-319-90924-0
912
$a
ZDB-2-POS
912
$a
ZDB-2-SXPI
950
$a
Political Science and International Studies (SpringerNature-41174)
950
$a
Political Science and International Studies (R0) (SpringerNature-43724)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入